removed privatesearch.io deeplinks

This commit is contained in:
privacytoolsIO 2015-08-21 15:42:32 +08:00
parent d14f3d10ab
commit dfa8293481

View File

@ -195,7 +195,7 @@ Over the last 16 months, as I've debated this issue around the world, every sing
<img src="img/layout/UKUSA.png" class="img-responsive pull-right" alt="UKUSA Agreement" style="margin-left:10px;">
<p>The <a href="https://www.privatesearch.io/?q=UKUSA%20Agreement" target="_blank">UKUSA Agreement</a> is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="http://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices" target="_blank">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="http://www.pbs.org/newshour/rundown/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other/" target="_blank">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each others citizens and <a href="http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa" target="_blank">share intelligence</a> to <a href="http://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett" target="_blank">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third party countries can and do spy on each other.</p>
<p>The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="http://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices" target="_blank">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="http://www.pbs.org/newshour/rundown/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other/" target="_blank">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each others citizens and <a href="http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa" target="_blank">share intelligence</a> to <a href="http://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett" target="_blank">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third party countries can and do spy on each other.</p>
<br>
@ -250,15 +250,15 @@ Over the last 16 months, as I've debated this issue around the world, every sing
<p>Services based in the United States are not recommended because of the countrys surveillance programs, use of <a href="https://www.eff.org/issues/national-security-letters/faq" target="_blank">National Security Letters</a> (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html" target="_blank">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.</p>
<p>An example of this is <a href="http://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order" target="_blank">Lavabit</a> a discontinued secure email service created by <a href="https://www.privatesearch.io/?q=Ladar%20Levison" target="_blank">Ladar Levison</a>. The FBI <a href="http://motherboard.vice.com/blog/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy" target="_blank">requested</a> Snowdens records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the services SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabits customers, not just Snowden's.</p>
<p>An example of this is <a href="http://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order" target="_blank">Lavabit</a> a discontinued secure email service created by Ladar Levison. The FBI <a href="http://motherboard.vice.com/blog/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy" target="_blank">requested</a> Snowdens records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the services SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabits customers, not just Snowden's.</p>
<p>Ultimately, Levison turned over the SSL keys and <a href="http://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email" target="_blank">shut down</a> the service at the same time. The US government then <a href="http://www.cnbc.com/id/100962389" target="_blank">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order.</p>
<a class="anchor" name="kdl"></a>
<h3>Key disclosure law - Who is required to hand over the encryption keys to authorities?</h3>
<p>Mandatory <a href="https://www.privatesearch.io/?q=key%20disclosure%20laws" target="_blank">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p>
<p>Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p>
<p><a href="https://www.privatesearch.io/?q=Steganography" target="_blank">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
<p>Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
<h3>Related Information</h3>
@ -466,7 +466,7 @@ Over the last 16 months, as I've debated this issue around the world, every sing
<h1>What is a warrant canary?</h1>
</div>
<img src="img/layout/warrant-canary.jpg" class="img-responsive pull-right" alt="Warrant Canary Example" style="margin-left:20px;">
<p>A <a href="https://www.privatesearch.io/?q=warrant%20canary" target="_blank">warrant canary</a> is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.</p>
<p>A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.</p>
<h4>Warrant Canary Examples:</h4>
<ol>
<li><a href="https://proxy.sh/canary" target="_blank">https://proxy.sh/canary</a></li>
@ -524,7 +524,7 @@ Over the last 16 months, as I've debated this issue around the world, every sing
<h3 class="panel-title">Tor Browser Bundle</h3>
</div>
<div class="panel-body">
<p><img src="img/tools/Tor-Browser.png" align="right" style="margin-left:5px;"><a href="https://www.privatesearch.io/?q=Tor%20Browser" target="_blank">Tor Browser</a> is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy addons, encryption and an advanced proxy.</p>
<p><img src="img/tools/Tor-Browser.png" align="right" style="margin-left:5px;">Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy addons, encryption and an advanced proxy.</p>
<p><a href="https://www.torproject.org/" target="_blank"><button type="button" class="btn btn-warning">Download: www.torproject.org</button></a></p>
<p>OS: Windows, Mac, Linux, <a href="https://mike.tig.as/onionbrowser/" target="_blank">iOS</a>, <a href="https://www.torproject.org/docs/android.html.en" target="_blank">Android</a>, <a href="https://github.com/torbsd/openbsd-ports" target="_blank">OpenBSD.</a></p>
</div>
@ -598,7 +598,7 @@ Over the last 16 months, as I've debated this issue around the world, every sing
<p>There is no known working solution, only a plugin that is easily circumvented. Please use Firefox instead. </p>
<h3>What about other browsers?</h3>
<p>
Chrome on iOS, Internet Explorer and Safari does not implement <a href="https://www.privatesearch.io/?q=WebRTC%20privacy" target="_blank">WebRTC</a> yet. <a href="#browser">But we recommend using Firefox on all devices.</a>
Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. <a href="#browser">But we recommend using Firefox on all devices.</a>
</p>
@ -1674,7 +1674,7 @@ diaspora* is based on three key philosophies: Decentralization, freedom and priv
</div>
<h3>Worth Mentioning</h3>
<ul>
<li><a href="https://namecoin.info/" target="_blank">Namecoin</a> - A decentralized DNS open source information registration and transfer system based on the <a href="https://www.privatesearch.io/?q=Bitcoin" target="_blank">Bitcoin</a> cryptocurrency.</li>
<li><a href="https://namecoin.info/" target="_blank">Namecoin</a> - A decentralized DNS open source information registration and transfer system based on the Bitcoin cryptocurrency.</li>
</ul>
<a class="anchor" name="productivity"></a>
<div class="page-header">
@ -2008,7 +2008,7 @@ It's important for a website like privacytools.io to be up-to-date. Keep an eye
</p>
<p><em>privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. never trust any company with your <a href="https://www.privatesearch.io/?q=privacy%20tools" target="_blank">privacy</a>, always encrypt.</em></p>
<p><em>privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. never trust any company with your privacy, always encrypt.</em></p>
</div>
<!-- Start Piwik -->